System Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

System Administration Guide Experion PKS Release 516 System Administration Guide EPDOC-X139-en-516A August 2020 DISCLAIMER This document contains Honeywell proprietary information. Information contained herein is to be used solely for the purpose submitted, and no part of this document or its contents shall be reproduced, published, or disclosed to a third party without the express permission of Honeywell International Sàrl. While this information is presented in good faith and believed to be accurate, Honeywell disclaims the implied warranties of merchantability and fitness for a purpose and makes no express warranties except as may be stated in its written agreement with and for its customer. In no event is Honeywell liable to anyone for any direct, special, or consequential damages. The information and specifications in this document are subject to change without notice. Copyright 2020 - Honeywell International Sàrl 2 Contents CONTENTS Contents 3 Chapter 1 - About this guide 9 Before reading this guide 10 Chapter 2 - System administration 11 Administering users 12 Windows user accounts 12 Users and groups 12 Passwords administration 13 Deleting a user 13 Experion Operator accounts 14 Control Builder client licenses 14 Administering displays 15 Changing service account passwords 16 Service account scope types 18 Changing passwords for single-machine scope accounts 21 Changing passwords for multi-machine scope accounts 22 Preparing to change passwords for system-wide scope accounts 23 Changing passwords for system-wide scope accounts 26 Changing DSA Advanced Security accounts passwords 30 Windows mngr account and Experion services and processes 31 Restricting access to operating systems and non-Station software 32 Creating a batch file to start Station 33 Specifying the batch file as a logon script 33 Preventing operator shut down 34 Removing access to Task Manager, Windows Explorer, and Internet Explorer 35 3 Contents Setting up automatic logon 36 Disabling the lock computer option 36 About the system time and time zone 37 Restoring server B from a hardware failure or corrupted database 38 Chapter 3 - Creating new operating system virtual machines and templates 41 Preparing partition replacement virtual hard disks 42 Creating the partition virtual hard disk 42 Creating the master partition virtual hard disk 44 Creating a virtual machine 45 Installing the Windows operating system using Microsoft media 48 Installing the Windows operating system using the Experion System Initialization media 50 Identifying the operating system and template requirements 50 Creating the Utility virtual hard disk 51 Creating the Experion System Initialization media configuration files for operating system only installations 53 Preparing the Utility virtual hard disk to include third-party applications56 Creating the master Utility virtual hard disk 57 Starting the Experion System Initialization media installation 58 Installing VMware Tools for a non-Experion Node 59 Configuring the Windows operating system 60 Enabling hardware acceleration 60 Completing the node installation 61 Creating operating system virtual machine templates 64 Chapter 4 - Managing server licenses 67 Viewing a server license 68 Exporting server licenses 68 Changing or comparing the Experion license 69 Chapter 5 - System administration of the virtualization environment 71 4 Contents Configuring the virtual machine load order 72 About starting and shutting down virtual machines 74 About suspending and resuming virtual machines 75 About snapshots 77 Preparing Experion nodes for snapshots including virtual machine memory 79 Changing virtual machine settings 83 Increasing the virtual hard disk size 83 Monitoring the virtualization environment 83 About resource usage 84 About system status 88 Monitoring the virtualization hardware using Dell OpenManage Server Administrator 90 Monitoring the virtualization infrastructure from Station 90 Using vMotion in the Experion virtualization environment 92 Shared storage maintenance 93 Moving a USB security device to a new ESXi host 94 Chapter 6 - Tuning system performance 97 Specialized terms 98 Network layers 98 Control network (level 1) 99 Supervisory network (level 2) 100 Application network (level 3) 100 Business network (level 4, not shown) 100 Tuning the Windows operating system 101 Setting the processor scheduling 101 Optimizing the server's hard disk performance 102 Fixing file system errors 102 5 Contents Defragmenting the hard disk 103 Optimizing the server's memory usage 105 Viewing memory usage 105 Increase memory to reduce paging 105 Adjusting the pagefile size 106 Network performance 107 Network traffic 107 Adjusting bindings and disabling protocols on standard networks 108 Special considerations for Fault Tolerant Ethernet/EHG networks 109 Adjusting the TCP/IP and NetBIOS binding order 109 Adjusting the NetBios protocol settings 110 Setting the link speed 110 Other network service optimizations 110 Optimizing other computer settings 111 Optimizing file sharing 111 Optimizing video settings 111 Optimizing system usage 111 Optimizing topology-related settings 112 Optimizing the scanning load 113 Guidelines for scan optimization 114 Checking the health of the scanning subsystem 116 Optimizing a controller's scanning packets 116 Importing the scan list into a spreadsheet 117 Manipulating and analyzing the spreadsheet 117 Monitoring the system 118 Assessing the need for hardware upgrades 118 Using Dell OpenManage 118 Monitoring performance 119 Configuring the Performance Monitor 120 6 Contents Interpreting the performance counter values 125 Monitoring System Health 126 About System Health Monitoring 126 System Health Monitoring considerations 127 Modifying System Health rules files 127 Notices 129 7 Contents 8 CHAPTER 1 ABOUT THIS GUIDE This guide is intended primarily for system administrators who are responsible for the administration and maintenance of the Experion Server software and related Windows operating system. Revision history Revision Date Description A August 2020 Initial release of document. How to use this guide This guide includes basic information on Windows system administration features and discusses how to: Task Go to Administer users, changing mngr "System administration" on page 11 password, setting the system time and time zone. Restricting access to the operating "Restricting access to operating systems system, Station, and non-Station software. and non-Station software" on page 32 Tuning system performance and "Tuning system performance" on performance monitoring. page 97 For more information about: n Installing the system, see the Software Installation User's Guide. n Configuring Experion after installation, see the Server and Client Configuration Guide. n Configuring Windows domain controllers or Windows workgroups, see the Windows Domain and Workgroups Implementation GuideWindows Domain and Workgroups Planning Guide. 9 Chapter 1 - About this guide n Starting up and shutting down Experion, see the Startup and Shutdown Guide. n Installing Wyse thin client software, see the Wyse Z90DE7 Thin Client Remote Peripheral Solution Installation Instructions. Before reading this guide Before using this guide for administration and maintenance of your Experion server, you need to: n Understand basic Experion concepts such as 'channel,' 'controller,' 'point,' and 'Station,' as explained in the Overview. n Install the Experion and third-party software as described in the SoftwareInstallation User's Guide. Prerequisite skills This guide assumes that you have a basic knowledge of the hardware you are using, that is, the computers, printers, network components. It also assumes that you have a basic familiarity with the Microsoft Windows operating systems that you are using. 10 CHAPTER SYSTEM ADMINISTRATION 2 The following topics describe the system administration tasks. In this section: Administering users 12 Administering displays 15 Changing service account passwords 16 Changing DSA Advanced Security accounts passwords 30 Windows mngr account and Experion services and processes 31 Restricting access to operating systems and non-Station software 32 About the system time and time zone 37 Restoring server B from a hardware failure or corrupted database 38 11 Chapter 2 - System administration Administering users The tasks you need to perform to administer users might include: n Creating Windows user accounts n Adding user accounts to groups n Deleting Windows user accounts n Creating Experion Operator accounts n Changing passwords n Viewing active Control Builder clients Windows user accounts To enable your users to have access to Experion they must be able to log on to the computers running the Experion software. To enable this you create Windows user accounts. The way you create Windows user accounts depends on your environment. If your site is set up in a domain environment, you create user accounts using the Active Directory Users and Computers tool. If your site is set up in a workgroup environment, you create user accounts locally using the Computer Management tool on each computer that a user needs to log on to. See the Microsoft Windows documentation for specific procedures on how to create user accounts. Users and groups Users inherit the rights of the groups to which they belong. For example, every member of the Product Administrator group inherits all the rights assigned to the Product Administrator group. There are several groups that are created when you install Experion. You can use Computer Management to see a description of each
Recommended publications
  • Using EMC VNX Storage with Vmware Vsphere Techbook CONTENTS
    Using EMC® VNX® Storage with VMware vSphere Version 4.0 TechBook P/N H8229 REV 05 Copyright © 2015 EMC Corporation. All rights reserved. Published in the USA. Published January 2015 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com). 2 Using EMC VNX Storage with VMware vSphere TechBook CONTENTS Preface Chapter 1 Configuring VMware vSphere on VNX Storage Technology overview................................................................................... 18 EMC VNX family..................................................................................... 18 FLASH 1st.............................................................................................. 18 MCx multicore optimization..................................................................
    [Show full text]
  • 5 Ways Vmware Vsphere Improves Backup and Recovery
    5 Ways VMware vSphereChapter1. Improves An Introduction Backup and to VMware Recovery Virtualization CONTENTS CONTENTS..............................................................................................................2 INTRODUCTION......................................................................................................2 A BRIEF HISTORY OF VMWARE ..............................................................................3 VIRTUALIZATION ARCHITECTURE...........................................................................4 THE HYPERVISOR............................................................................................................................4 RINGS IN VIRTUALIZATION..............................................................................................................7 CPU SCHEDULER............................................................................................................................9 DIFFERENCES BETWEEN ESX & ESXI.............................................................................................9 WHAT IS A VIRTUAL MACHINE?...........................................................................12 ENCAPSULATION.......................................................................................................................... 12 VIRTUAL MACHINE HARDWARE ................................................................................................. 13 VIRTUAL MACHINE FILES ...........................................................................................................
    [Show full text]
  • Introduction to Virtualization Virtualization
    Introduction to Virtualization Prashant Shenoy Computer Science CS691D: Hot-OS Lecture 2, page 1 Virtualization • Virtualization: extend or replace an existing interface to mimic the behavior of another system. – Introduced in 1970s: run legacy software on newer mainframe hardware • Handle platform diversity by running apps in VMs – Portability and flexibility Computer Science CS691D: Hot-OS Lecture 2, page 2 Types of Interfaces • Different types of interfaces – Assembly instructions – System calls – APIs • Depending on what is replaced /mimiced, we obtain different forms of virtualization Computer Science CS691D: Hot-OS Lecture 2, page 3 Types of Virtualization • Emulation – VM emulates/simulates complete hardware – Unmodified guest OS for a different PC can be run • Bochs, VirtualPC for Mac, QEMU • Full/native Virtualization – VM simulates “enough” hardware to allow an unmodified guest OS to be run in isolation • Same hardware CPU – IBM VM family, VMWare Workstation, Parallels,… Computer Science CS691D: Hot-OS Lecture 2, page 4 Types of virtualization • Para-virtualization – VM does not simulate hardware – Use special API that a modified guest OS must use – Hypercalls trapped by the Hypervisor and serviced – Xen, VMWare ESX Server • OS-level virtualization – OS allows multiple secure virtual servers to be run – Guest OS is the same as the host OS, but appears isolated • apps see an isolated OS – Solaris Containers, BSD Jails, Linux Vserver • Application level virtualization – Application is gives its own copy of components that are not shared • (E.g., own registry files, global objects) - VE prevents conflicts – JVM Computer Science CS691D: Hot-OS Lecture 2, page 5 Examples • Application-level virtualization: “process virtual machine” • VMM /hypervisor Computer Science CS691D: Hot-OS Lecture 2, page 6 The Architecture of Virtual Machines J Smith and R.
    [Show full text]
  • IBM Virtual Machine Facility/370 : Systems Introduction
    GC20-1800-0 IBM Virtual Machine Facility/370 : Systems Introduction The IBM Virtual Machine Facility/370 (VM/370) is a System Control Program (SCP) that has been designed specifically for the IBM System/370. VM/370 manages the IBM System/370 in such a way that mUltiple remote terminal users appear to have a dedicated computing system at their disposal. Within this "virtual machine" the user may run the operaHng system of his choice, subject to the restrictions noted in "Appendix C: VM/370 Restrictions" of this manual. The design of VM/370 is based on the IBM Control Program-67/Cam­ bridge Monitor System (CP-67/CMS) which is executed on an IBM System/360 Model 67. The Conversational Monitor System (CMS) is the major subsystem ofVM/370. CMS provides problem solving and program development services to the user, as well as supporting facilities for a remote user who chooses to run some other operating system in his virtual machine. This manual provides introductory information about the facilities provided by VM/370, and defines the min­ imum equipment configuration necessary for execution. Preface This manual provides introductory information on the IBM Virtual Machine Facility/370 (VM/370) and its associated subsystem, the Conversational Monitor Sys­ tem (CMS), as well as an overview of the purpose and functions of VM/370. It is assumed that the user has a prior knowledge of virtual storage concepts as implemented on the IBM System/370 via dynamic address translation. The reader is referred to Part I of the student text publication Introduction to Virtual Storage in System/370, Order No.
    [Show full text]
  • Virtual Machine Benchmarking Kim-Thomas M¨Oller Diploma Thesis
    Universitat¨ Karlsruhe (TH) Institut fur¨ Betriebs- und Dialogsysteme Lehrstuhl Systemarchitektur Virtual Machine Benchmarking Kim-Thomas Moller¨ Diploma Thesis Advisors: Prof. Dr. Frank Bellosa Joshua LeVasseur 17. April 2007 I hereby declare that this thesis is the result of my own work, and that all informa- tion sources and literature used are indicated in the thesis. I also certify that the work in this thesis has not previously been submitted as part of requirements for a degree. Hiermit erklare¨ ich, die vorliegende Arbeit selbstandig¨ und nur unter Benutzung der angegebenen Literatur und Hilfsmittel angefertigt zu haben. Alle Stellen, die wortlich¨ oder sinngemaߨ aus veroffentlichten¨ und nicht veroffentlichten¨ Schriften entnommen wurden, sind als solche kenntlich gemacht. Die Arbeit hat in gleicher oder ahnlicher¨ Form keiner anderen Prufungsbeh¨ orde¨ vorgelegen. Karlsruhe, den 17. April 2007 Kim-Thomas Moller¨ Abstract The resurgence of system virtualization has provoked diverse virtualization tech- niques targeting different application workloads and requirements. However, a methodology to compare the performance of virtualization techniques at fine gran- ularity has not yet been introduced. VMbench is a novel benchmarking suite that focusses on virtual machine environments. By applying the pre-virtualization ap- proach for hypervisor interoperability, VMbench achieves hypervisor-neutral in- strumentation of virtual machines at the instruction level. Measurements of dif- ferent virtual machine configurations demonstrate how VMbench helps rate and predict virtual machine performance. Kurzfassung Das wiedererwachte Interesse an der Systemvirtualisierung hat verschiedenartige Virtualisierungstechniken fur¨ unterschiedliche Anwendungslasten und Anforde- rungen hervorgebracht. Jedoch wurde bislang noch keine Methodik eingefuhrt,¨ um Virtualisierungstechniken mit hoher Granularitat¨ zu vergleichen. VMbench ist eine neuartige Benchmarking-Suite fur¨ Virtuelle-Maschinen-Umgebungen.
    [Show full text]
  • Virtualization with Cisco UCS, Nexus 1000V, and Vmware Technology Design Guide
    Virtualization with Cisco UCS, Nexus 1000V, and VMware TECHNOLOGY DESIGN GUIDE August 2013 Table of Contents Preface ........................................................................................................................................1 CVD Navigator .............................................................................................................................2 Use Cases .................................................................................................................................. 2 Scope ......................................................................................................................................... 2 Proficiency .................................................................................................................................. 3 Introduction .................................................................................................................................4 Technology Use Cases ............................................................................................................... 4 Use Case: Reduce Application Deployment Time ................................................................... 5 Use Case: Simplify Network Management in the Data Center ................................................ 5 Use Case: Increase Network Performance in the Hypervisor Environment ............................. 5 Design Overview ........................................................................................................................
    [Show full text]
  • Deploying Microsoft SQL Server on Amazon Web Services
    Deploying Microsoft SQL Server on Amazon Web Services This paper has been archived. November 2019 For the latest technical content about the AWS Cloud, see the AWS Whitepapers & Guides page: https://aws.amazon.com/whitepapers Archived Notices Customers are responsible for making their own independent assessment of the information in this document. This document: (a) is for informational purposes only, (b) represents current AWS product offerings and practices, which are subject to change without notice, and (c) does not create any commitments or assurances from AWS and its affiliates, suppliers or licensors. AWS products or services are provided “as is” without warranties, representations, or conditions of any kind, whether express or implied. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. © 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved. Archived Contents Introduction .......................................................................................................................... 1 Amazon RDS for SQL Server .......................................................................................... 1 SQL Server on Amazon EC2 ........................................................................................... 1 Hybrid Scenarios .............................................................................................................. 2 Choosing Between
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Windows NT Network Management: Reducing Total Cost of Ownership - 9 - Performance Monitoring
    Windows NT ...: Reducing Total Cost of Ownership - Chapter 9 - Performance Monitorin Page 1 of 13 [Figures are not included in this sample chapter] Windows NT Network Management: Reducing Total Cost of Ownership - 9 - Performance Monitoring AN OLD ADAGE SAYS, "IF YOU can’t measure it, you can’t manage it." Even if you can measure something, how can you tell if your changes are making a difference if you don’t have baseline information? It’s important to monitor a server’s or work- station’s performance to maximize your investment in these tools. If a user complains that her computer is too slow, you often need more information to fix the problem. For example, if the problem is loading Web pages on a computer using an analog modem, the modem is probably limiting the system’s performance. However, if the computer is an older model, certain operations may wait for the CPU to finish processing. In this case, a complete system upgrade may be the best solution. The usefulness of performance monitoring goes far beyond handling user expectations. A network and systems administrator can use information obtained by analyzing the operations of existing hardware, software, and networking devices to predict the timing of upgrades, justify the cost of replacing and upgrading devices, and assist in troubleshooting. Performance monitoring ultimately reduces TCO and is a vital part of managing any IT environment. Performance monitoring helps answer important questions about your current environment. For example, you may want to know which activity specifically uses the most resources in your environment. If you determine that it is loading Web pages, then upgrading the RAM or the CPU speed of client machines may not help much.
    [Show full text]
  • An Evolutionary Study of Linux Memory Management for Fun and Profit Jian Huang, Moinuddin K
    An Evolutionary Study of Linux Memory Management for Fun and Profit Jian Huang, Moinuddin K. Qureshi, and Karsten Schwan, Georgia Institute of Technology https://www.usenix.org/conference/atc16/technical-sessions/presentation/huang This paper is included in the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16). June 22–24, 2016 • Denver, CO, USA 978-1-931971-30-0 Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16) is sponsored by USENIX. An Evolutionary Study of inu emory anagement for Fun and rofit Jian Huang, Moinuddin K. ureshi, Karsten Schwan Georgia Institute of Technology Astract the patches committed over the last five years from 2009 to 2015. The study covers 4587 patches across Linux We present a comprehensive and uantitative study on versions from 2.6.32.1 to 4.0-rc4. We manually label the development of the Linux memory manager. The each patch after carefully checking the patch, its descrip- study examines 4587 committed patches over the last tions, and follow-up discussions posted by developers. five years (2009-2015) since Linux version 2.6.32. In- To further understand patch distribution over memory se- sights derived from this study concern the development mantics, we build a tool called MChecker to identify the process of the virtual memory system, including its patch changes to the key functions in mm. MChecker matches distribution and patterns, and techniues for memory op- the patches with the source code to track the hot func- timizations and semantics. Specifically, we find that tions that have been updated intensively.
    [Show full text]
  • 05 Vcloud Services Consultant
    Optimizing Windows for VMware View 4.5 Optimizing Windows for VMware View™ 4.5 (Optimizing Windows 7, Windows Vista and XP) Version 2.0 For use only by VMware PSO and VMware Solution Providers Consulting Service Delivery Aid – Not a Customer Deliverable Optimizing Windows for VMware View 4.5 Version History Date Ver. Author Description Rev iewers February 2011 V2.0 Tim Federwitz Second Release (Added Dav id Richardson, John Windows XP and Vista) Dodge, Matt Coppinger, Matt Wood August 2010 V1.0 Tim Federwitz First Release (Windows 7 John Dodge, Matt only ) Coppinger, Matt Lesak, Ry an Miersma, Justin Venezia © 2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html . VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2011 VMware, Inc. All rights reserved. Page 2 of 44 Optimizing Windows for VMware View 4.5 Contents 1. Introduction ......................................................................................... 4 1.1 Comparing Default and Optimized Windows 7 Installations ........................................ 4 1.2 How to use this Guide ............................................................................................... 4 2.
    [Show full text]
  • Simuboost: Scalable Parallelization of Functional System Simulation
    SimuBoost: Scalable Parallelization of Functional System Simulation Zur Erlangung des akademischen Grades eines Doktors der Ingenieurwissenschaften von der KIT-Fakultät für Informatik des Karlsruher Instituts für Technologie (KIT) genehmigte Dissertation von Dipl.-Inform. Marc Rittinghaus aus Iserlohn Tag der mündlichen Prüfung: 19.07.2019 Hauptreferent: Prof. Dr. Frank Bellosa Karlsruher Institut für Technologie Korreferent: Prof. Dr. Hans P. Reiser Universität Passau KIT – Universität des Landes Baden-Württemberg und nationales Forschungszentrum in der Helmholtz-Gemeinschaft www.kit.edu Abstract Gathering detailed run-time information such as memory access traces in operating system and security research often involves functional full system simulation (FFSS). The simulator runs the workload of interest in a virtual machine (VM), gradually interpreting or translating instructions so that they operate on the state of the VM and allow for comprehensive instrumentation. While functional full system simulation is a powerful tool, a severe limitation is its immense slowdown. For QEMU, we have measured average slowdowns of 30x and 60x for plain simulation and tracing of memory accesses, respectively. Simulators offering more advanced instrumentation capabilities can even be an order of magnitude slower. This quickly renders functional simulation impractical for long-running, networked, or interactive workloads. Furthermore, the slowdown creates unrealistic timing behavior whenever activities external to the virtual machine (e.g., I/O) are involved. In this thesis, we present SimuBoost, a method for drastically accelerating func- tional full system simulation. SimuBoost runs the workload in a fast and interactive hardware-assisted virtual machine while periodically taking checkpoints. These checkpoints then serve as starting points for simulations, enabling to simulate and analyze each interval simultaneously in one job per interval.
    [Show full text]